General

  • Target

    c085775bbf86c914d7511e38cc9c759b58e27f0a196dee5918f3782a0642ea1e

  • Size

    1.3MB

  • MD5

    f652dd47a6ae50b8a0046b0213522c45

  • SHA1

    e9cb4d50e99e41d19c030392de5c4e874ce3f3fa

  • SHA256

    c085775bbf86c914d7511e38cc9c759b58e27f0a196dee5918f3782a0642ea1e

  • SHA512

    1223ea121e7310c1f2808c15353c484576448a620446249666f780cc1c2acdf557a4731bb988405e48329dfca537aa83d6f1a9a7a5aafdbc7a8e5b788323cb40

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c085775bbf86c914d7511e38cc9c759b58e27f0a196dee5918f3782a0642ea1e
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections